What is a possible consequence to a business of a cyber-attack?
Year 9 Spr1 Lesson 7 PREVENTION

Quiz
•
Information Technology (IT)
•
8th Grade
•
Medium

Thomas Reynolds
Used 4+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Loss of customer trust
Increased revenue
Improved security
Expansion of business
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the possible consequences to a business of a cyber-attack?
Loss of data / financial data / reputation
Operational / financial / commercial disruption
Safety of equipment, with personal safety implications
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify basic physical and logical cyber-security prevention methods.
Firewalls and antivirus software
Encryption and access controls
Security policies and employee training
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best compares different methods of physical and logical security?
Physical security involves protecting hardware and facilities, while logical security protects data and software.
Logical security involves protecting hardware and facilities, while physical security protects data and software.
Both physical and logical security focus on protecting data and software.
Physical security and logical security are the same and focus on protecting hardware.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Evaluate different methods of physical and logical security.
Physical security includes methods like surveillance cameras and locks, while logical security involves firewalls and encryption.
Physical security involves firewalls and encryption, while logical security includes surveillance cameras and locks.
Both physical and logical security involve only digital methods.
Physical security and logical security are the same and involve only physical barriers.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fill in the blank: _______ methods prevent a user from physically gaining access to a device.
Physical
Logical
Virtual
Remote
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fill in the blank: _______ methods use software to restrict user access to data.
Logical
Physical
Biometric
Token-based
Create a free account and access millions of resources
Similar Resources on Quizizz
35 questions
ASTS TIK 6 GENAP

Quiz
•
6th Grade - University
35 questions
SAS Informatika Kelas 7 Ganjil

Quiz
•
7th Grade - University
40 questions
SOAL ULANGAN SEMESTER GANJIL

Quiz
•
8th Grade
45 questions
SAS GANJIL INFORMATIKA KELAS 7 TAHUN 2024-2025

Quiz
•
7th Grade - University
40 questions
PSTS KELAS 8 SMT I

Quiz
•
8th Grade
45 questions
LATIHAN SOAL ASTS 1 KELAS 8

Quiz
•
8th Grade
35 questions
Latihan Soal Informatika Kls8

Quiz
•
8th Grade
40 questions
KISI UAS KELAS 7F, SEMESTER GENAP TAHUN 2025

Quiz
•
7th Grade - University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
10 questions
Identify Slope and y-intercept (from equation)

Quiz
•
8th - 9th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
15 questions
Volume Prisms, Cylinders, Cones & Spheres

Quiz
•
8th Grade
26 questions
June 19th

Quiz
•
4th - 9th Grade
25 questions
Argumentative Writing & Informational Text Vocabulary Review

Quiz
•
8th Grade
18 questions
Informational Text Vocabulary

Quiz
•
7th - 8th Grade